Category Archives: Science And Technology

SUN’S MAGNETIC FIELD SET TO FLIP

Within the next few weeks the Sun’s magnetic field will complete it’s process of flipping. This is an event which takes place every 11 years and is accompanied by intense solar activity.

This solar activity could have serious implications for us, as the solar flares thrown out by the sun at this time have the potential to damage satellites and take out power grids on earth. In this age where we are dependent upon telecommunications, and the blackout of vast areas of the country could have catastrophic consequences. In 1859 the solar maximum caused, the then new technology of telegraphs, to be damaged, resulted in telegraph operators to be electrocuted, the auroras caused were seen as far south as the Caribbean; and in 1989 a solar flare resulted in the blackout of Quebec, and melted power transformers in New Jersey. Scientists will be closely monitoring the sun hoping this solar maximum will pass without incident.

Read More: BBC

PARTICLE ACCELERATOR CREATING BLACK HOLES TO EXPLORE HIGHER DIMENSIONS IN THE UNIVERSE

The Large Hadron Collider (LHC) in Switzerland, is currently closed until April 2015, for an upgrade. When it reopens, one of the experiments scientists will be exploring are ones to investigate higher dimensions of the universe.

Scientists at the LHC have been colliding particles together, in order to create mini-black holes. The expectation in doing so, will give the physicists glimpses of dimensions we do not usually experience.

The LHC was made famous when it discovered the Higgs Boson, last year. A Higgs Boson is the particle that the current model of physics describes as giving mass to all particles in the universe. The so called “God Particle” was the missing piece in the Standard Model of Particle Physics, the beautifully simple model of the universe at particle level.

BUG OR DRONE?

With the signing of a new law by President Obama this month, the Federal Aviation Administration (FAA) has been directed to completely open US airspace to drones by September 30, 2015. There are many uses arguable for the use of drones, but most think of the unmanned planes we have seen in action against Al Qaeda when the term drone is mentioned.

The Air Force Research Laboratory made an animated video of the many uses of Micro Air Vehicles and how they may work in the field. After being released by a larger air vehicle, these bird or bug like surveillance drones can literally fly under the radar as well as enter places other drones cannot.

The video includes a section on “Remote Tag and Target” and “Precision Engagement.” The narration states, “Individual MAV’s may perform direct attack missions and can be equipped with incapacitating chemicals, combustable payloads, or even explosives for precision targeting capabilities.”

A picture of an existing MAV drone is now pictured as the main image on the Wright-Patterson Air Force Base web site. Back on July 22, 2010, they also released a Fact Sheet entitled “MICRO AIR VEHICLE INTEGRATION & APPLICATION RESEARCH INSTITUTE.”

John Horgan of National Geographic has published an article called “Unmanned Flight: The Drones Come Home” in this month’s issue documenting the history of drones and their possible uses in the US.

Read More
Wright-Patterson Air Force Base
MICRO AIR VEHICLE INTEGRATION & APPLICATION RESEARCH INSTITUTE
‘Bug-Sized’ Drones Are The Most Frightening Type Of Killer Robot Yet

WHY DO YOU NEED PGP?

Why do you need PGP?

by Phil Zimmermann

It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having an illicit affair. Or you may be doing something that you feel shouldn’t be illegal, but is. Whatever it is, you don’t want your private electronic mail (E-mail) or confidential documents read by anyone else. There’s nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution.

Perhaps you think your E-mail is legitimate enough that encryption is unwarranted. If you really are a law-abiding citizen with nothing to hide, then why don’t you always send your paper mail on postcards? Why not submit to drug testing on demand? Why require a warrant for police searches of your house? Are you trying to hide something? You must be a subversive or a drug dealer if you hide your mail inside envelopes. Or maybe a paranoid nut. Do law-abiding citizens have any need to encrypt their E-mail?

What if everyone believed that law-abiding citizens should use postcards for their mail? If some brave soul tried to assert his privacy by using an envelope for his mail, it would draw suspicion. Perhaps the authorities would open his mail to see what he’s hiding. Fortunately, we don’t live in that kind of world, because everyone protects most of their mail with envelopes. So no one draws suspicion by asserting their privacy with an envelope. There’s safety in numbers. Analogously, it would be nice if everyone routinely used encryption for all their E-mail, innocent or not, so that no one drew suspicion by asserting their E-mail privacy with encryption. Think of it as a form of solidarity.

Today, if the Government wants to violate the privacy of ordinary citizens, it has to expend a certain amount of expense and labor to intercept and steam open and read paper mail, and listen to and possibly transcribe spoken telephone conversation. This kind of labor-intensive monitoring is not practical on a large scale. This is only done in important cases when it seems worthwhile.

More and more of our private communications are being routed through electronic channels. Electronic mail is gradually replacing conventional paper mail. E-mail messages are just too easy to intercept and scan for interesting keywords. This can be done easily, routinely, automatically, and undetectably on a grand scale. International cablegrams are already scanned this way on a large scale by the NSA.

We are moving toward a future when the nation will be crisscrossed with high capacity fiber optic data networks linking together all our increasingly ubiquitous personal computers. E-mail will be the norm for everyone, not the novelty it is today. The Government will protect our E-mail with Government-designed encryption protocols. Probably most people will acquiesce to that. But perhaps some people will prefer their own protective measures.

Senate Bill 266, a 1991 omnibus anti-crime bill, had an unsettling measure buried in it. If this non-binding resolution had become real law, it would have forced manufacturers of secure communications equipment to insert special trap doors in their products, so that the Government can read anyone’s encrypted messages. It reads:

“It is the sense of Congress that providers of electronic communications services and manufacturers of electronic communications service equipment shall insure that communications systems permit the Government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law.”
This measure was defeated after rigorous protest from civil libertarians and industry groups.

In 1992, the FBI Digital Telephony wiretap proposal was introduced to Congress. It would require all manufacturers of communications equipment to build in special remote wiretap ports that would enable the FBI to remotely wiretap all forms of electronic communication from FBI offices. Although it never attracted any sponsors in Congress in 1992 because of citizen opposition, it was reintroduced in 1994.

Most alarming of all is the White House’s bold new encryption policy initiative, under development at NSA since the start of the Bush administration, and unveiled April 16th, 1993. The centerpiece of this initiative is a Government-built encryption device, called the Clipper chip, containing a new classified NSA encryption algorithm. The Government is encouraging private industry to design it into all their secure communication products, like secure phones, secure FAX, etc. AT&T is now putting the Clipper into their secure voice products. The catch: At the time of manufacture, each Clipper chip will be loaded with its own unique key, and the Government gets to keep a copy, placed in escrow. Not to worry, though — the Government promises that they will use these keys to read your traffic only when duly authorized by law. Of course, to make Clipper completely effective, the next logical step would be to outlaw other forms of cryptography.

If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable military grade public-key cryptographic technology. Until now.

PGP empowers people to take their privacy into their own hands. There’s a growing social need for it. That’s why I wrote it.

[ PGPi Home > Documentation > Why do you need PGP? > English ]

FOR MORE INFORMATION:

OSX WHOLE DISK ENCRYPTION:

MOUNTAIN LION ENCRYPTION:

PGP WHOLE DISK ENCRYPTION:

TIME MACHINE:

SCIENTIFIC PROOF: SMOKING WEED HAS COGNITIVE AND PSYCHOMOTOR EFFECTS

Advocates of cannabis use as a recreational drug have long argued that it is safe. However, a new study has shown that smoking weed has a negative effect on brain function.

The main active constituent in canabis is Delta(9)-Tetrahydrocannabinol (THC). The study looked at the effect of increasing the dose of Delta(9)-Tetrahydrocannabinol (THC), combined with tobacco, on users compared with the control group who did not smoke cannabis. Before now no one had studied the effects of increased levels of Delta(9)-Tetrahydrocannabinol (THC) on behaviour.

As the strength of weed increases, and as some states have now legalised recreational cannabis use the study is very timely.

The results showed that users showed worsening motor skills and processing times. The study warned that consequently recreational cannabis use poses a public health and safety issue.

Read More